System and method for managing security access for users to network systems

Active Publication Date: 2007-10-09
T MOBILE INNOVATIONS LLC
View PDF23 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0013]A first advantage of the present network security system is the centralized management of access rights by the enterprise directory system to a large number of different network systems for a large number of users. A second advantage of the present network security system is that it automates user access to the different network systems using a single access card or access token. Thus, rather than having multiple accounts and passwords for many different systems that must be set up by a system administrator for each system, and consequently having to remember or record those passwords, users are provided with access to the various network systems using a single access card. A third advantage of the present network security system is that it provides seamless integration and expansion for the addition of future network system applications and users. A fourth advantage of the present network security system is that a user's

Problems solved by technology

It is problem in the art of network security to provide and manage access to a plurality of different network systems for a plurality of users with different levels of access rights.
Unfortunately, when access rights for a user change, or are terminated all together, each of the individual network systems must be manually updated to delete the user profile in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for managing security access for users to network systems
  • System and method for managing security access for users to network systems
  • System and method for managing security access for users to network systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

Enterprise Directory System FIG. 1:

[0019]FIG. 1 depicts an enterprise directory system 100, a network 103, a first network system 104, second network system 105, and Nth network system 106. The network 103 is connected to the enterprise directory system 100 and the network system 104, the network system 105, and the network system 106. Those skilled in the art will appreciate that numerous other network systems could be connected to the network 103 although only network systems 104-106 are depicted on FIG. 1 for clarity.

[0020]The network 103 could be one or more networks that connect the network systems 104-106. For example, the network 103 could comprise a Local Area Network (“LAN”) or a Wide Area Network “(WAN”) or a LAN connected to a WAN. The network 103 could also be interconnected with other WANs by a data network, such as an IP, Frame Relay or ATM network. In another example of the present invention, the network 103 could be connected to other wireline or wireless networks. F...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A network security system for managing access to a plurality of different network systems for a plurality of users. The network security system includes an enterprise directory system configured to process request messages from each of the network systems requesting access rights for a user to generate a response message for each of the network systems that includes the access rights for the user. The enterprise directory system is also configured to process a single termination message to generate an individual termination message for each of the network systems that includes an instruction to terminate the access rights for one of the users. The resource directory is configured to receive an instruction to terminate the access rights for the corresponding user and process the instruction to generate the termination message for the enterprise directory system.

Description

RELATED APPLICATIONS[0001]Not applicableFEDERALLY SPONSORED RESEARCH OR DEVELOPMENT[0002]Not applicableMICROFICHE APPENDIX[0003]Not applicableBACKGROUND OF THE INVENTION[0004]1. Field of the Invention[0005]The invention relates to network security systems, and specifically, to a network security system that provides centralized access and termination control to a plurality of different network systems for a plurality of network users.[0006]2. Description of the Prior Art[0007]It is problem in the art of network security to provide and manage access to a plurality of different network systems for a plurality of users with different levels of access rights. One solution to this problem is to utilize network access cards, sometimes referred to in the art as “smart cards,” to provide users with the appropriate access to the different network systems according to the level of the user's access rights. A network access card system connected to the network provides customized network acces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06F15/16G06F15/167G06F15/173
CPCH04L63/0853G06F21/6218
Inventor LAMASTRES, DANIEL G.EVERSON, JOHN MICHAELNORRIS, JAMES W.
Owner T MOBILE INNOVATIONS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products